The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current ecosystem of network elements, such as switches and appliances, is largely dominated by devices supplied and sold with a bundled operating system, and software dedicated to manage the device's forwarding hardware, however, these platforms are not open-source and cannot be arbitrarily customized, and there is no cost transparency or flexibility in choosing software different to the bundled...
A novel design of pole mounted switch controller is introduced in this paper, embedded Linux operating system was used to enrich the functions of the pole mounted controller and to enhance the intelligence of the controller. Software structure of this novel designed controller is presented in detail. Multiple processes design method was applied to split the software application into 3 processes, namely...
Big volume of bioinformatics data needs high processing powers. BIG-BIO is one of the solutions for addressing these challenges. BIG-BIO is a big data analyst MapReduce Hadoop Cluster for Bioinformatics applications. BIG-BIO is tested by implementing the bioinformatics wordcount problem and its applications using MapReduce programming pattern. BIG-BIO counts the number of occurrence of each word in...
In this paper we show an SDN controller implementation named Basebox that listens to Linux Netlink and translates commands into OpenFlow rules to control a domain of OF-DPA based switches in an OpenStack cluster.
Test beds are essential in teaching and research on computer networks and security. However, designing and deploying a test bed is an expensive task. Various virtualization technologies make this task easier by enabling the creation and deletion of virtual machines (VMs) and their networks in less time on a single physical infrastructure. However, these VM based test beds are heavy-weight. In this...
Carrier network service infrastructures are becoming increasingly complex since thousands of service-specific hardware-based network nodes are implemented to support a wide variety of network services. This has resulted in critically high increases in the maintenance costs to ensure service quality for network services and the deployment costs for new network services. Addressing these problems requires...
We present a high performance logging system for embedded UNIX and GNU/Linux applications. Compared to the standard UNIX and GNU/Linux logging method, syslog, our method has two orders of magnitude lower latency and an order of magnitude higher message throughput. This speed-up is mainly due to the use of a memory-mapped file as the means of inter-process communication, fewer memory copies and the...
This paper describes a low-overhead and prolonged Linux process logging mechanism that is separated into networks for embedded systems with small memory. It is useful to log the behavior of Linux processes in Android in order to debug, test, and learn about the embedded systems. However, the logging system interferes with process scheduling and requires huge storage to capture the process behavior...
Our proposed solution is a Linux bonding approach to vertical handoff for heterogeneous networks. Currently, there are approaches of Linux bonding implementation for wired & wireless interfaces. The Linux bonding provides methods to aggregate multiple wired or wireless interfaces to support fault-tolerance and throughput improvement. The existing interface bonding allows the aggregation of homogeneous...
In recent years, significant research has been conducted to boost the performance and increase the reliability of high performance computing (HPC) clusters. As the number of compute nodes in modern HPC clusters continues to grow, it is critical to design clusters with low power consumption and low failure rate. In particular, it is widely known that the internal disk drives of compute nodes (in the...
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new network protocols are proposed so that it is now becoming harder to manage the network. In the conditional network, every network protocol uses the fixed port, the so-called well-known port...
With the rapid growth of both information and users, how to effectively improve the quality of network service becomes an urgent problem to be addressed. Load balancing is to overcome this problem in an effective way. At present it is mainly achieved by the load-balancing hardware and software, but there are also many problems, such as unscientific and inaccurate algorithm, imperfect and impractical...
Managing the configurations of complex systems consisting of various components requires combined efforts by multiple domain experts. These experts have extensive knowledge about different components in the system they need to manage, but little understanding of the issues outside their individual areas of expertise. As a result, the configuration constraints, changes, and procedures specified by...
Virtualization has fundamentally changed the data center network. The last hop of the network is no longer handled by a physical network switch, but rather is typically performed in software inside the server to switch among virtual machines hosted by that server. In this paper, we present the concept of a sNICh, which is a combination of a network interface card and switching accelerator for modern...
Along with the development and application of the high speed network, in order to reduce the cost of data copy and context switch, the paper presents an improved method of zero-copy data transmission that is suitable for the high speed network environment on Linux and UNIX platforms. The method can reduce the number of data copy and context switch between kernel and user mode. It is tested by transmitting...
L4 Linux is a use-level Linux running on top of L4/Fiasco, which is developed at Dresden Operating System Research Group. Most of the L4 Linux documentation are focus on the programming technique, other than emphasizing the design and implementation of the L4 Linux. This paper aimed at L4 Linux education, containing microkernel based OS concept and the implementation of L4Linux. It would make more...
In recent years, we have witnessed a growing interest in high performance storage (HPS) using different SAN (Storage Area Network) solutions. Our growing needs for high performance storage solutions in Saudi Aramco, the world's largest oil producing company, has provided an opportunity to evaluate some of the top SAN providers available in the market as an alternative to typical storage solutions...
According to the characteristics, attack mechanisms and the fault phenomenon of ARP deception, this paper makes an in-depth analysis on it from the viewpoint of the set, the automatic prevention and control algorithms and model of ARP deception are given. The implementation according to the model is carried out on Linux operating system, the actual operating results show that the model can effectively...
Private computing on public platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP must secure its encryption keys to ensure that application isolation is robust and reliable. To this end we offer a protection scheme for PCPP encryption keys. In this paper we first discuss a commonly used key storage...
The objective of this paper is to implement and evaluate a cluster computing environment by clustering idle PCs (personal computer) with Diskless slave nodes on campuses in order to obtain the effectiveness of the largest computer potency. Two sets of cluster platforms BCCD and DRBL are used to compare parallel computing performance. The objective is to prove that DRBL has better performance than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.